咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51 篇 工学
    • 50 篇 计算机科学与技术...
    • 20 篇 电气工程
    • 16 篇 软件工程
    • 8 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 安全科学与工程
    • 3 篇 信息与通信工程
    • 2 篇 土木工程
    • 1 篇 建筑学
    • 1 篇 核科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 13 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 理学
    • 7 篇 数学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 军事学

主题

  • 48 篇 computational in...
  • 34 篇 security
  • 20 篇 computational mo...
  • 16 篇 intrusion detect...
  • 14 篇 data security
  • 11 篇 military computi...
  • 11 篇 testing
  • 9 篇 computer securit...
  • 9 篇 data mining
  • 8 篇 monitoring
  • 8 篇 artificial intel...
  • 8 篇 training
  • 7 篇 particle swarm o...
  • 7 篇 feature extracti...
  • 7 篇 information secu...
  • 6 篇 computer archite...
  • 6 篇 optimization
  • 6 篇 decision making
  • 6 篇 algorithm design...
  • 6 篇 surveillance

机构

  • 3 篇 department of co...
  • 3 篇 dalhousie univer...
  • 2 篇 department of co...
  • 2 篇 larus technologi...
  • 2 篇 air force resear...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 system architect...
  • 2 篇 centre for opera...
  • 2 篇 school of comput...
  • 2 篇 department of el...
  • 2 篇 vdg security b.v...
  • 1 篇 penn state univ ...
  • 1 篇 office of the in...
  • 1 篇 faculty of compu...
  • 1 篇 virginia tech bl...
  • 1 篇 assistive techno...
  • 1 篇 ministry of educ...
  • 1 篇 larus technol re...
  • 1 篇 us air force res...

作者

  • 4 篇 a. nur zincir-he...
  • 4 篇 abielmona rami
  • 3 篇 alexander h. lev...
  • 2 篇 jean berger
  • 2 篇 ahmed ghanmi
  • 2 篇 ali miri
  • 2 篇 eric granger
  • 2 篇 chris thornton
  • 2 篇 trevor martin
  • 2 篇 anna t. lawnicza...
  • 2 篇 dmitry o. gorodn...
  • 2 篇 jörg denzinger
  • 2 篇 robert sabourin
  • 2 篇 hingston philip
  • 2 篇 martin trevor
  • 2 篇 yun shen
  • 2 篇 kathleen m. carl...
  • 2 篇 akira namatame
  • 2 篇 malcolm i. heywo...
  • 2 篇 philip hingston

语言

  • 149 篇 英文
  • 1 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA"
150 条 记 录,以下是21-30 订阅
排序:
Optimal defense synthesis for jamming attacks in cognitive radio networks via swarm optimization
Optimal defense synthesis for jamming attacks in cognitive r...
收藏 引用
2012 5th ieee symposium on computational intelligence for security and Defence applications, cisda 2012
作者: Zhang, Haopeng Liu, Zhenyi Hui, Qing Department of Mechanical Engineering Texas Tech. University Lubbock TX 79409-1021 United States
In this paper, the optimal cognitive network reconfiguration problem is considered in the presence of jamming interference and delayed signals in a game play scenario. In most previous literature, only one jammer is i... 详细信息
来源: 评论
mTRACK-Monitoring time-varying relations in approximately categorised knowledge
mTRACK-Monitoring time-varying relations in approximately ca...
收藏 引用
ieee symposium on computational intelligence for security and defense applications, cisda 2009
作者: Martin, Trevor Shen, Yun Artificial Intelligence Group University of Bristol BS8 1TR United Kingdom
Recent initiatives in defence related information systems have emphasised the need to bring together information from multiple sources and fuse it into a form suitable for decision makers. This paper outlines a four s... 详细信息
来源: 评论
Behavior-Driven Video Analytics System for Critical Infrastructure Protection  7
Behavior-Driven Video Analytics System for Critical Infrastr...
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-cisda)
作者: Curtis, Phillip Harb, Moufid Abielmona, Rami Petriu, Emil Larus Technol Res & Engn Div Ottawa ON Canada Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON Canada
The convergence of a security aware environment with the proliferation of inexpensive high quality video imaging devices has led to the deployment of cameras at a high number of critical infrastructure sites. As many ... 详细信息
来源: 评论
Smoothing Gamma Ray Spectra to Improve Outlier Detection  7
Smoothing Gamma Ray Spectra to Improve Outlier Detection
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-cisda)
作者: Barnabe-Lortie, Vincent Bellinger, Colin Japkowicz, Nathalie Univ Ottawa Sch Elect Engn & Comp Sci Ottawa ON K1N 6N5 Canada
Rapid detection of radioisotopes in gamma-ray data can, in some situations, be an important security concern. The task of designing an automated system for this purpose is complex due to, amongst other factors, the no... 详细信息
来源: 评论
On the Use of Design Diversity in Fault Tolerant and Secure Systems: A Qualitative Analysis
On the Use of Design Diversity in Fault Tolerant and Secure ...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (cisda)
作者: Rodriguez, Manuel Kwiat, Kevin A. Kamhoua, Charles A. Air Force Res Lab Cyber Assurance Branch Informat Directorate Rome NY 13441 USA
The design and development of modern critical systems, including cyber-physical systems, is experiencing a greater reliance on the outsourcing of systems parts and the use of third -party components and tools. These i... 详细信息
来源: 评论
Clustering of tracklets for on-line multi-target tracking in networked camera systems
Clustering of tracklets for on-line multi-target tracking in...
收藏 引用
symposium Series on computational intelligence, ieee SSCI 2011 - 2011 ieee symposium on computational intelligence for security and defense applications, cisda 2011
作者: Vijverberg, Julien A. Koeleman, Cornelis J. De With, Peter H.N. Eindhoven University of Technology Eindhoven Netherlands VDG Security B.V. Zoetermeer Netherlands CycloMedia B.V. Waardenburg Netherlands
This paper considers the problem of tracking a variable number of objects through a surveillance site monitored by multiple cameras with slightly overlapping field-of-views. To this end, we propose to cluster tracklet... 详细信息
来源: 评论
A Trace Abstraction Approach for Host-based Anomaly Detection
A Trace Abstraction Approach for Host-based Anomaly Detectio...
收藏 引用
ieee symposium on computational intelligence for security and defense applications (cisda)
作者: Murtaza, Syed Shariyar Khreich, Wael Hamou-Lhadj, Abdelwahab Gagnon, Stephane Concordia Univ ECE SBA Res Lab Montreal PQ Canada Univ Quebec Outaouais Dept Sci Adm Gatineau PQ Canada
High false alarm rates and execution times are among the key issues in host-based anomaly detection systems. In this paper, we investigate the use of trace abstraction techniques for reducing the execution time of ano... 详细信息
来源: 评论
computational verification of system architectures
Computational verification of system architectures
收藏 引用
ieee symposium on computational intelligence in security and defense applications
作者: Zaidi, Abbas K. Levis, Alexander H. George Mason Univ Syst Architectures Lab ECE Dept MS 1G5 Fairfax VA 22030 USA
The paper presents a computational approach for verifying system architectures that employs a modal logic, an architecture design process, and a computer-aided formal model checking technique. The approach is shown to... 详细信息
来源: 评论
Intrusion Detection System using Discrete Fourier Transform  7
Intrusion Detection System using Discrete Fourier Transform
收藏 引用
7th ieee symposium on computational intelligence for security and defense applications (ieee-cisda)
作者: Chimedtseren, Enkhbold Iwai, Keisuke Tanaka, Hidema Kurokawa, Takakazu Natl Def Acad Japan Dept Comp Sci Kanagawa Japan
Intrusion Detection System (IDS) detects attacks using pattern files which are known as "signature". Effectiveness of detection depends on the kind of signature. In this paper, we propose a signature generat... 详细信息
来源: 评论
computational intelligence support for smart queries and adaptive data
Computational intelligence support for smart queries and ada...
收藏 引用
ieee symposium on computational intelligence in security and defense applications
作者: Martin, Trevor Azvine, Ben Shen, Yun Univ Bristol Artificial Intelligence Grp Bristol BS8 1TR Avon England BT Res & Venrturing Intelligent Syst Lab Computat Intelligence Grp Ipswich Suffolk IP5 3RE England Univ Bristol Artific Intelligence Grp Bristol BS8 1TR Avon England
The UK initiative in "Network Enabled Capability" (NEC) can be loosely summarised as "right information, right place, right time - and not too much". It is closely related to the US concept of &quo... 详细信息
来源: 评论